123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899 |
- /* Copyright (c) 2017-2018, The Tor Project, Inc. */
- /* See LICENSE for licensing information */
- #define HS_DESCRIPTOR_PRIVATE
- #include "core/or/or.h"
- #include "trunnel/ed25519_cert.h" /* Trunnel interface. */
- #include "lib/crypt_ops/crypto_ed25519.h"
- #include "feature/hs/hs_descriptor.h"
- #include "feature/dirparse/unparseable.h"
- #include "test/fuzz/fuzzing.h"
- static void
- mock_dump_desc__nodump(const char *desc, const char *type)
- {
- (void)desc;
- (void)type;
- }
- static int
- mock_rsa_ed25519_crosscert_check(const uint8_t *crosscert,
- const size_t crosscert_len,
- const crypto_pk_t *rsa_id_key,
- const ed25519_public_key_t *master_key,
- const time_t reject_if_expired_before)
- {
- (void) crosscert;
- (void) crosscert_len;
- (void) rsa_id_key;
- (void) master_key;
- (void) reject_if_expired_before;
- return 0;
- }
- static size_t
- mock_decrypt_desc_layer(const hs_descriptor_t *desc,
- const uint8_t *encrypted_blob,
- size_t encrypted_blob_size,
- const uint8_t *descriptor_cookie,
- int is_superencrypted_layer,
- char **decrypted_out)
- {
- (void)is_superencrypted_layer;
- (void)desc;
- (void)descriptor_cookie;
- const size_t overhead = HS_DESC_ENCRYPTED_SALT_LEN + DIGEST256_LEN;
- if (encrypted_blob_size < overhead)
- return 0;
- *decrypted_out = tor_memdup_nulterm(
- encrypted_blob + HS_DESC_ENCRYPTED_SALT_LEN,
- encrypted_blob_size - overhead);
- size_t result = strlen(*decrypted_out);
- if (result) {
- return result;
- } else {
- tor_free(*decrypted_out);
- return 0;
- }
- }
- int
- fuzz_init(void)
- {
- disable_signature_checking();
- MOCK(dump_desc, mock_dump_desc__nodump);
- MOCK(rsa_ed25519_crosscert_check, mock_rsa_ed25519_crosscert_check);
- MOCK(decrypt_desc_layer, mock_decrypt_desc_layer);
- ed25519_init();
- return 0;
- }
- int
- fuzz_cleanup(void)
- {
- return 0;
- }
- int
- fuzz_main(const uint8_t *data, size_t sz)
- {
- hs_descriptor_t *desc = NULL;
- uint8_t subcredential[DIGEST256_LEN];
- char *fuzzing_data = tor_memdup_nulterm(data, sz);
- memset(subcredential, 'A', sizeof(subcredential));
- hs_desc_decode_descriptor(fuzzing_data, subcredential, NULL, &desc);
- if (desc) {
- log_debug(LD_GENERAL, "Decoding okay");
- hs_descriptor_free(desc);
- } else {
- log_debug(LD_GENERAL, "Decoding failed");
- }
- tor_free(fuzzing_data);
- return 0;
- }
|